In this new webinar series, you will learn the tactics used to exploit weaknesses in traditional security solutions. We will examine the methods and tools adversaries use to gain access to vital systems and data.

Come prepared for the unexpected, as Stuart often has at least one cool trick up his sleeve.